Blind source extraction (BSE) is particularly at- tractive to solve blind signal mixture problems where only a few source signals are desired. Many existing BSE methods do not take into account the existence of nois...
详细信息
Blind source extraction (BSE) is particularly at- tractive to solve blind signal mixture problems where only a few source signals are desired. Many existing BSE methods do not take into account the existence of noise and can only work well in noise-free environments. In practice, the desired signal is often contaminated by additional noise. Therefore, we try to tackle the problem of noisy component extraction. The reference signal carries enough prior information to dis- tinguish the desired signal from signal mixtures. According to the useful properties of Gaussian moments, we incorporate the reference signal into a negentropy objective function so as to guide the extraction process and develop an improved BSE method. Extensive computer simulations demonstrate its validity in the process of revealing the underlying desired signal.
The memristor is a kind of non-linear element with memory function,which can be applied to chaotic systems to increase signal randomness and *** this paper,a new four-dimensional hyper-chaotic system is designed based...
详细信息
The memristor is a kind of non-linear element with memory function,which can be applied to chaotic systems to increase signal randomness and *** this paper,a new four-dimensional hyper-chaotic system is designed based on a flux controlled memristor model,which can generate complex chaotic *** basic dynamic theory analysis and numerical simulations of the system,such as the stability of equilibrium points,the Lyapunov exponents and dimension,Poincare maps,the power spectrum,and the waveform graph prove that it has rich dynamic ***,the circuit implementation of this system is *** consistency of simulation program with integrated circuit emphasis(SPICE)simulation and numerical analysis proves the ability to generate ***,a new image encryption scheme is designed by using the memristor-based hyper-chaotic system proposed in this *** scheme involves a total of two *** using different security analysis factors,the proposed algorithm is compared with other image encryption schemes,including correlation analysis,information entropy,*** results show that the proposed image encryption scheme has a large key space and presents a better encryption effect.
With the diversified development of the digital devices, such as computer, mobile phone and television, how to resize an image or video to adapt to different display screens has been a heated topic. Seam carving does ...
详细信息
Cloud is the computing paradigm which provides computing resource as a service through network. The client can use computing resource in a convenient and on-demand way, just like the water and the electricity we use d...
详细信息
Computational cognitive modeling has recently emerged as one of the hottest issues in the AI area. Both symbolic approaches and connectionist approaches present their merits and demerits. Although Bayesian method is s...
详细信息
Computational cognitive modeling has recently emerged as one of the hottest issues in the AI area. Both symbolic approaches and connectionist approaches present their merits and demerits. Although Bayesian method is suggested to incorporate advantages of the two kinds of approaches above, there is no feasible Bayesian computational model concerning the entire cognitive process by now. In this paper, we propose a variation of traditional Bayesian network, namely Globally Connected and Locally Autonomic Bayesian network (GCLABN), to formally describe a plausible cognitive model. The model adopts a unique knowledge representation strategy, which enables it to encode both symbolic concepts and their relationships within a graphical structure, and to generate cognition via a dynamic oscillating process rather than a straightforward reasoning process like traditional approaches. Then a simple simulation is employed to illustrate the properties and dynamic behaviors of the model. All these traits of the model are coincident with the recently discovered properties of the human cognitive process.
A novel symplectic algorithm is proposed to solve the Maxwell Schrodinger (M-S) system for investigating light-matter interaction. Using the fourth-order symplectic integration and fourth-order collocated differences,...
详细信息
A novel symplectic algorithm is proposed to solve the Maxwell Schrodinger (M-S) system for investigating light-matter interaction. Using the fourth-order symplectic integration and fourth-order collocated differences, M-S equations are discretized in temporal and spatial domains, respectively. The symplectic finite-difference time-domain (SFDTD) algorithm is developed for accurate and efficient study of coherent interaction between electromagnetic fields and artificial atoms. Particularly, the Dirichlet boundary condition is adopted for modeling the Rabi oscillation problems under the semiclassical framework. To implement the Dirichlet boundary condition, image theory is introduced, tailored to the high-order collocated differences. For validating the proposed SFDTD algorithm, three-dimensional numerical studies of the population inversion in the Rabi oscillation are presented. Numerical results show that the proposed high-order SFDTD(4, 4) algorithm exhibits better numerical performance than the conventional FDTD(2, 2) approach at the aspects of accuracy and efficiency for the long-term simulation. The proposed algorithm opens up a promising way toward a high-accurate energy-conservation modeling and simulation of complex dynamics in nanoscale light-matter interaction.
Edge computing can alleviate the problem of insufficient computational resources for the user equipment,improve the networkprocessing environment,and promote the user *** computing is well known as a prospective meth...
详细信息
Edge computing can alleviate the problem of insufficient computational resources for the user equipment,improve the networkprocessing environment,and promote the user *** computing is well known as a prospective method for the development of the Internet of Things(IoT).However,with the development of smart terminals,much more time is required for scheduling the terminal high-intensity upstream dataflow in the edge server than for scheduling that in the downstream *** this paper,we study the scheduling strategy for upstream dataflows in edge computingnetworks and introduce a three-tier edge computingnetwork *** propose a Time-Slicing Self-Adaptive Scheduling(TSAS)algorithm based on the hierarchical queue,which can reduce the queuing delay of the dataflow,improve the timeliness of dataflow processing and achieve an efficient and reasonable performance of dataflow *** experimental results show that the TSAS algorithm can reduce latency,minimize energy consumption,and increase system throughput.
This paper presents a method for monitoring the particle swarm optimization process that accounts for the random nature of the system's external environment and the fuzzy character of the particles' decision-m...
详细信息
To overcome the drawback that switched Ethernet can not meet the real-time requirements in industrial communications, an improved message transmission model in which switch and the end-nodes control the real-time traf...
详细信息
Considering the problem of the local optimization in the adaptive genetic algorithm (AGA) , this paper presents an improved adaptive genetic algorithm (IAGA) which can optimize the weights and thresholds of the neural...
详细信息
暂无评论